Chinese hackers attack US organizations and exploit bugs in F5, Citrix y Microsoft Exchange

Chinese hackers attack the US

The Department of Homeland Security (DHS CISA) Agencia de Ciberseguridad y Protección de Infraestructuras (DHS CISA) has published security guidelines for the private sector and government agencies. CISA dicho that Chinese hackers associated with the Ministry of State Security of the Republic of China are attacking organizations in the United States and exploit bugs in F5, citrix, Pulse Secure and Microsoft Exchange.

According to CISA experts, durante el año pasado, Chinese hackers have regularly scanned US government networks in search of network devices, and then used against them exploits for resh vulnerabilities, trying to gain a foothold in vulnerable networks and continue lateral movement.

La Agencia de Seguridad de Infraestructura y Ciberseguridad (CISA) has consistently observed Chinese Ministry of State Security (MSS)-affiliated cyber threat actors using publicly available information sources and common, well-known tactics, técnicas, y procedimientos (TTP) to target U.S. Government agencies”, — says CISA report.

Según el informe, some of these attacks were successful, and the attackers achieved their goal.

Chinese hackers attack the USA

The main targets of the Chinese hackers were F5 Big-IP load balancers, Citrix and Pulse Secure VPN devices, and Microsoft Exchange mail servers. Serious vulnerabilities have been identified in all of these products over the past year, incluido: CVE-2020-5902, CVE-2019-19781, CVE-2019-11510, y CVE-2020-0688.

Having infiltrated the network, Chinese hackers seek to advance further and steal data. For this is used a variety of tools (including open source and legitimate), the most common of which are the Cobalt Strike platform, as well as the China Chopper Web Shell and Mimikatz tools.

ZDNet journalists nota that not only Chinese cybercriminals are interested in the listed above vulnerabilities.

"Además, Chinese hackers aren’t the only ones targeting these particular networking appliances. The devices listed above have also been targeted by Iranian state actors, according to a report from the private cyber-security sector and a cyber-security alert published by the FBI last month”, — report ZDNet journalists.

Let me remind you that recently specialists of the Crowdstrike and Dragos companies observó that the Iranian «gobierno» hackers are putting on sale access to the networks of compromised companies, and provide access to other criminal groups.

I will also remind you that the US authorities prevenido of a possible intensification of attacks by Iranian hacker groups on the public sector. Perhaps their warning was reasonable.

Por Vladimir Krasnogolovy

Vladimir es un especialista técnico al que le encanta dar consejos y sugerencias cualificados sobre los productos de GridinSoft. Está disponible las 24 horas del día, los 7 días de la semana para ayudarte con cualquier pregunta relacionada con la seguridad en Internet.

Dejar un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *